A blog by Devendra Tewari
Concern | Meaning | Mechanisms |
---|---|---|
Authenticity | Are you really who you say you are? | secret keys, biometrics |
Confidentiality | Is information secure and privacy protected? | cryptography |
Data Integrity | Can the data be changed or corrupted? | hashing |
Access control | Will the information be accessed only by authorized parties? | access control lists, role based security |
Availability | Will the information be available when needed? | disaster planning, recovering from crack attack, clustering, data backup/redundancy |
Non repudiation | what is the proof of a digital transaction? | digital signatures |